A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
The product inappropriately exposes a directory listing with an index of all the resources located inside of the directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://hackerone.com/reports/434404 | third party advisory permissions required |
https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA | mailing list third party advisory patch |
https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | third party advisory mailing list |
https://usn.ubuntu.com/4561-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | third party advisory mailing list |